Saw the graphic below on the website, NakedSecurity, and felt compelled to remind the readers here on the blog that the scammers will not let up and will take advantage of any opportunity (such as Christmas) to trick and rob people. One very common scam is the phone call you answer from a person who claims they are tech support from Microsoft and want to fix a problem they detected with your computer. Please do not fall for this… Hang up on them and do not proceed with any conversation. Most of the time if they know they have a live number and person, they will relentlessly call back (often with a different scam).

To protect yourself, do the following: Most of us have voicemail or an answering machine. Let all your calls ring through. If you have caller ID, only answer the calls from numbers you are absolutely sure about. Even the phone numbers that may appear to be legit (i.e. from your area code) can be masked to look like a local number. I know this may sound extreme; but, this is how bad this problem is.

Also, there are poisoned websites out there that will prompt you to call a number to fix your computer. It is the same deal, they will scam you for money to fix a problem that does not exist. Bottomline is to avoid all solicitations by phone, computer, email, etc…

“Boiler rooms full scammers would make cold call after cold call, ploughing day and night through lists of phone numbers to scare victims into paying up for technical support they didn’t need for malware infections they didn’t have.”.

The holiday season makes for a busy time for us all; including, the hackers and scammers. I came across an article from CBS Pittsburgh (NewsRadio 1020 KDKA) where they interviewed a person by the name of Jason Glassberg who is the Co-Founder of Casaba Security. What caught my interest was that Mr. Glassberg provided a listing of 12 scams that you need to be on the lookout for this holiday season that I thought was worth a repost here on the blog.

1. Fake Retailers Online

“A website that’s put together in a way that makes you think you are going to an Amazon.com, but in reality they’ve gone and changed the O in Amazon to a zero,” said Glassberg.

Once on the site, hackers can install malware on your computer or steal your credit card information.

2. Phony Online Deals

Glassberg says if you see a deal that seems too good to be true, it probably is.

3. Fake Apps And Mobile Games

Before you download an app, search online to make sure there are not any complaints against the one you want to download.

4. Watering Hole Websites

These are fake websites that want to install malware onto your hard drive. These are usually fake news sites.

5. Card Skimming

These are readers that people use to get a copy of your credit card when you use an ATM or get gasoline. Glassberg says the only defense is to physically check the machine.

6. Fake Emails Or Text Alerts

This is the phishing attack that can look like it is from your bank, government agency or even a friend.

7. Charity Scams

These are fake emails or phone calls from an organization that sounds like a charity. Glassberg says they will ask for a credit card payment immediately or even a gift card. Glassberg says if they ask for a gift card, you can be almost sure this is a scam.

8. Clicking On A Link From A Hacked Friend

If you have a friend who is hacked, you may get an email that appears to be from them so check with them first if the link seems suspicious.

9. Ransomware

You are affected by a piece of malware that wipes out all of the data on your computer, and you are expected to pay a ransom to get it back. Glassberg says to just regularly backup your data.

10. Wi-Fi Hacking

Keep your WiFi equipment up to date

11. Fake Call Centers

This is an old scam that is popular during the holidays. Someone will call and claim that you owe money for a past due bill. Glassberg says to verify with your company.

12. Car Fob Redirector

Some hackers have now been able to build a “redirector” that replays your car unlock mechanism. Glassberg says to lock your car using your key.

In light of hurricane Harvey, I pulled the information below in this blog post directly from the US-Cert website and the FTC website warning people to be cautious when responding to emails that may contain links or attachments that direct user to phishing or malware-infected websites.

From my experience, when life events occur of great magnitude, there is an element of our global society that will try to take advantage of people. This element of people will try to scare, intimidate, scam and rob you via electronic means; whether it be by phone, email, SMS messaging and even Facebook. My motto in our electronic world is “Believe Nothing, Verify Everything”. Just because it looks legit or a friend posted it, make sure you verify it.

I encourage you to read the article below by Colleen Tressler, Consumer Education Specialist, FTC to educate yourself about scammer’s exploiting people when tragedy occurs.

It’s heartbreaking to see people lose their lives, homes, and businesses to the ongoing flooding in Texas. But it’s despicable when scammers exploit such tragedies to appeal to your sense of generosity.

If you’re looking for a way to give, the FTC urges you to be cautious of potential charity scams. Do some research to ensure that your donation will go to a reputable organization that will use the money as promised.

Consider these tips when asked to give:

Donate to charities you know and trust with a proven track record with dealing with disasters.

Be alert for charities that seem to have sprung up overnight in connection with current events. Check out the charity with the Better Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch, or GuideStar.

Designate the disaster so you can ensure your funds are going to disaster relief, rather than a general fund.

Never click on links or open attachments in e-mails unless you know who sent it. You could unknowingly install malware on your computer.

Don’t assume that charity messages posted on social media are legitimate. Research the organization yourself.

When texting to donate, confirm the number with the source before you donate. The charge will show up on your mobile phone bill, but donations are not immediate.

Find out if the charity or fundraiser must be registered in your state by contacting the National Association of State Charity Officials. If they should be registered, but they’re not, consider donating through another charity.

To learn more, go to Charity Scams. For tips to help you prepare for, deal with, and recover from a severe weather event, visit Dealing with Weather Emergencies.

If you are an Android smartphone or tablet user; and, you use the Google Chrome browser (or the native Android Browser), you may want to take a look at (and install) the mobile version of Web of Trust. I currently use the PC version of Web of Trust on all of my computers to help me determine which sites are reputable and which sites are not.

Against what types of online threats can WOT protect you?

Malware & Viruses – Avoid visiting websites that host malicious software, such as viruses, spyware, and adware that can steal your information and spread to other devices.

Phishing – Turn back from malicious links in fake emails, websites and text messages that are designed to fool you into giving away personal information.

Scams – Users ratings warn you when you visit a site that may host any type of fraud designed to steal money or personal information.

Spyware – WOT can warn you when a site has been reported to host spyware, which collects your personal information without your knowledge.

If you are looking for love using the online dating and social services, BEWARE! The cybercriminal, posing as your Romeo or Juliet, may in fact be in it for the money.

According the to Federal Trade Commission, scammers, using fake and very convincing profiles, will often use these services to lure those seeking companionship to send them money. This is accomplished by gaining the trust of the online love interest by using the mystique of the internet and getting into the psyche of the person. Let’s face it, when we’re in love, we are gullible and will believe anything.

Typically a warning sign is simply this: If the communication with an online love interest turns toward the subject of “MONEY”, then BEWARE.

What the FTC says to look out for…

If the online lover wants to leave the dating site immediately and use personal e-mail or IM accounts, then BEWARE. The intent here is to manipulate you further in a more private and personal cyber setting.

In the online lover claims instant feelings of love, then BEWARE.

If the online lover claims to be from the United States but currently overseas, then BEWARE.

If the online lover claims to be planning to visit, but is unable to do so because of a tragic event, then BEWARE.

If the online lover starts asking for money to pay for travel, visas or other travel documents, medication, a child or other relative’s hospital bills, recovery from a temporary financial setback, or expenses while a big business deal comes through, then BEWARE.

These scammers will work it as long as it takes. As a matter of fact, it is not uncommon for these criminal cyber lovers to have more than one person on the hook at a time. So, BEWARE of that online Romeo or Juliet and in the event the urgency for MONEY crops up, cut the relationship off and report it to the Federal Trade Commission at www.ftc.gov/complaint or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261.

How do they do it? Each week I select links to articles from the sites (blogs) that are composed by the authors who are associated with the What’s On My PC blogroll. The quality and content is amazing and serves as an excellent learning source for those who have the computer and information technology bug. Please, I encourage you to visit these sites.

Visitors to What's On My PC

2,973,822

whatsonmypc.blog

Welcome

What's On My PC

(www.whatsonmypc.blog)

The intent of this blog is to share my knowledge base of computers, software, gadgets, smartphones and information technology in terms that is presentable and understandable to ALL; and at the same time feed my obsession (and passion) for information technology by learning from others.

I encourage you to visit frequently and communicate via the comments section at the bottom of any of the articles.

All blog posts (articles) are the original works of the author of "What's On My PC..." (unless otherwise indicated)